1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
12

What do file extensions tell you about a particular file? Why can a file have only one type of file extension?

Computers and Technology
1 answer:
MrMuchimi3 years ago
6 0
It tells u what kind of file it is and also if it were to have two extensions it would interfere and cause it not to work
You might be interested in
Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
lilavasa [31]
Background colour is the answer
6 0
4 years ago
Read 2 more answers
What is the difference between a software engineer and a system analyst?
cricket20 [7]

Answer:

A software engineer make things to be perfect. A system analyst researches about things. That is the difference.

Explanation:

Hope this helps!

6 0
4 years ago
What word can you spell with the letters e, e, a, m, g, t, and k?
SVETLANKA909090 [29]
Eat,get and Meg
all the words I can think of
8 0
4 years ago
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
4 years ago
Select the three early tools that were prototypes of modern farming tools used for harvesting crops.
KatRina [158]
I believe the answer is Spears, sickles, and cradles. I hope that helps!
6 0
4 years ago
Other questions:
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • A(n _______________ is a pre-written formula that is built into excel
    12·1 answer
  • Cable television, as well as some networks, uses ________ cable.
    10·1 answer
  • Given the following HTML form snippet of markup, which of the following user inputs would meet the regular expression rule writt
    7·1 answer
  • Which flowchart symbol indicates the start or the end of a process?
    8·1 answer
  • WILL GIVE BRAINLIEST
    5·2 answers
  • Which of the following is an algorithm?
    15·2 answers
  • Which of the follow efficiencies would be considered unreasonable?
    13·1 answer
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!